SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP vBulletin pre-authenticated command injection attempt
This event is generated when an attempt to exploit vBulletin is detected. Impact: Web Application Attack Details: vBulletin contains and internal file that does not provide input santitation against configurations sent remotely. This leads to an attacker being able to inject commands. Ease of Attack: Simple, requires authentication, and exploits are publicly available.
This event is generated when an attempt to exploit vBulletin is detected.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2019-16759 |
Loading description
|
CVE-2020-17496 |
Loading description
|
Tactic: Initial Access
Technique: Drive-by Compromise
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org